General

  • Target

    2024-06-12_73ad8f29df9ad2cf3c9e6ce8f52a1c6f_cryptolocker

  • Size

    57KB

  • MD5

    73ad8f29df9ad2cf3c9e6ce8f52a1c6f

  • SHA1

    9ab298aa1adb347308741d528b43e0ca0258f14f

  • SHA256

    3178260e15c4d1875f3f86bd241c470cf90d86e0b6a29b6dd6633e99f5e4e296

  • SHA512

    d635523ef0c2f35fa5f7ffb2c269bdccb3c9548cb593182c5d8d383b927eeef36038ba16d89fe93d76510e845ad83cfed74297d9fc8b66a4219bd79a8b6db45a

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjlQ:bP9g/xtCS3Dxx0r

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_73ad8f29df9ad2cf3c9e6ce8f52a1c6f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections